Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in version 1.4.1.
References
Configurations
History
No history.
Information
Published : 2023-12-22 21:15
Updated : 2024-01-03 17:43
NVD link : CVE-2023-51387
Mitre link : CVE-2023-51387
CVE.ORG link : CVE-2023-51387
JSON object : View
Products Affected
dromara
- hertzbeat
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')